CVE Vulnerabilities

CVE-2018-0732

Published: Jun 12, 2018 | Modified: Nov 07, 2023
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
4.3 MODERATE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Ubuntu
LOW

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).

Affected Software

Name Vendor Start Version End Version
Openssl Openssl 1.0.2 (including) 1.0.2o (including)
Openssl Openssl 1.1.0 (including) 1.1.0h (including)
JBoss Core Services Apache HTTP Server 2.4.29 SP2 RedHat openssl *
JBoss Core Services Apache HTTP Server 2.4.29 SP2 RedHat *
JBoss Core Services on RHEL 6 RedHat jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6 *
JBoss Core Services on RHEL 6 RedHat jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6 *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7 *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7 *
Red Hat Enterprise Linux 7 RedHat openssl-1:1.0.2k-16.el7 *
Red Hat OpenShift Application Runtimes Node.js 10 RedHat rhoar-nodejs-1:10.9.0-1.el7 *
Red Hat OpenShift Application Runtimes Node.js 8 RedHat rhoar-nodejs-1:8.11.4-2.el7 *
Openssl Ubuntu artful *
Openssl Ubuntu bionic *
Openssl Ubuntu cosmic *
Openssl Ubuntu devel *
Openssl Ubuntu disco *
Openssl Ubuntu trusty *
Openssl Ubuntu xenial *
Openssl098 Ubuntu trusty *
Openssl1.0 Ubuntu bionic *
Openssl1.0 Ubuntu cosmic *

References